[Senate Report 104-357] [From the U.S. Government Publishing Office] Calendar No. 563 104th Congress Report SENATE 2d Session 104-357 _______________________________________________________________________ THE NATIONAL INFORMATION INFRASTRUCTURE PROTECTION ACT OF 1995 _______ August 27, 1996.--Ordered to be printed Filed under the authority of the order of the Senate of August 2, 1996 _______________________________________________________________________ Mr. Hatch, from the Committee on the Judiciary, submitted the following R E P O R T [To accompany S. 982] The Committee on the Judiciary, to which was referred the bill (S. 982) to amend the Computer Fraud and Abuse Act, having considered the same, reports favorably thereon with an amendment in the nature of a substitute and recommends that the bill, as amended, do pass. CONTENTS Page I. Purpose..........................................................3 II. Legislative history..............................................3 III. Committee action.................................................5 IV. Section-by-section analysis......................................6 V. Regulatory impact statement.....................................14 VI. Cost estimate...................................................14 VII. Changes in existing law.........................................16 The amendment is as follows: Strike all after the enacting clause and insert the following: SECTION 1. SHORT TITLE. This Act may be cited as the ``National Information Infrastructure Protection Act of 1996''. SEC. 2. COMPUTER CRIME. Section 1030 of title 18, United States Code, is amended-- (1) in subsection (a)-- (A) in paragraph (1)-- (i) by striking ``knowingly accesses'' and inserting ``having knowingly accessed''; (ii) by striking ``exceeds'' and inserting ``exceeding''; (iii) by striking ``obtains information'' and inserting ``having obtained information''; (iv) by striking ``the intent or''; (v) by striking ``is to be used'' and inserting ``could be used''; and (vi) by inserting before the semicolon at the end the following: ``willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it''; (B) in paragraph (2)-- (i) by striking ``obtains information'' and inserting ``obtains-- ``(A) information''; and (ii) by adding at the end the following new subparagraph: ``(B) information from any department or agency of the United States; or ``(C) information from any protected computer if the conduct involved an interstate or foreign communication;''; (C) in paragraph (3)-- (i) by inserting ``nonpublic'' before ``computer of a department or agency''; (ii) by striking ``adversely''; and (iii) by striking ``the use of the Government's operation of such computer'' and inserting ``that use by or for the Government of the United States''; (D) in paragraph (4)-- (i) by striking ``Federal interest'' and inserting ``protected''; and (ii) by inserting before the semicolon the following: ``and the value of such use is not more than $5,000 in any 1-year period''; (E) by striking paragraph (5) and inserting the following: ``(5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; ``(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or ``(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage;''; and (F) by inserting after paragraph (6) the following new paragraph: ``(7) with intent to extort from any person, firm, association, educational institution, financial institution, government entity, or other legal entity, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to cause damage to a protected computer;''; (2) in subsection (c)-- (A) in paragraph (1), by striking ``such subsection'' each place that term appears and inserting ``this section''; (B) in paragraph (2)-- (i) in subparagraph (A)-- (I) by inserting ``, (a)(5)(C),'' after ``(a)(3)''; and (II) by striking ``such subsection'' and inserting ``this section''; (ii) by redesignating subparagraph (B) as subparagraph (C); (iii) by inserting immediately after subparagraph (A) the following: ``(B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(2), if-- ``(i) the offense was committed for purposes of commercial advantage or private financial gain; ``(ii) the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or ``(iii) the value of the information obtained exceeds $5,000;''; and (iv) in subparagraph (C) (as redesignated), (i) by striking ``such subsection'' and inserting ``this section''; and (II) by adding ``and'' at the end; (C) in paragraph (3)-- (i) in subparagraph (A)-- (I) by striking ``(a)(4) or (a)(5)(A)'' and inserting ``(a)(4), (a)(5)(A), (a)(5)(B), or (a)(7)''; and (II) by striking ``such subsection'' and inserting ``this section''; and (ii) in subparagraph (B)-- (I) by striking ``(a)(4) or (a)(5)'' and inserting ``(a)(4), (a)(5)(A), (a)(5)(B), (a)(5)(C), or (a)(7)''; and (II) by striking ``such subsection'' and inserting ``this section''; and (D) by striking paragraph (4); (3) in subsection (d), by inserting ``subsections (a)(2)(A), (a)(2)(B), (a)(3), (a)(4), (a)(5), and (a)(6) of '' before ``this section.''; (4) in subsection (e)-- (A) in paragraph (2)-- (i) by striking ``Federal interest'' and inserting ``protected''; (ii) in subparagraph (A), by striking ``the use of the financial institution's operation or the Government's operation of such computer'' and inserting ``that use by or for the financial institution or the Government''; and (iii) by striking subparagraph (B) and inserting the following: ``(B) which is used in interstate or foreign commerce or communication;''; (B) in paragraph (6), by striking ``and'' at the end; (C) in paragraph (7), by striking the period at the end and inserting ``; and''; and (D) by adding at the end the following new paragraphs: ``(8) the term `damage' means any impairment to the integrity or availability of data, a program, a system, or information, that-- ``(A) causes loss aggregating at least $5,000 in value during any 1-year period to one or more individuals; ``(B) modifies or impairs, or potentially modifies or impairs, the medical examination, diagnosis, treatment, or care of one or more individuals; ``(C) causes physical injury to any person; or ``(D) threatens public health or safety; and ``(9) the term `government entity' includes the Government of the United States, any State or political subdivision of the United States, any foreign country, and any state, province, municipality, or other political subdivision of a foreign country.''; and (5) in subsection (g)-- (A) by striking ``, other than a violation of subsection (a)(5)(B),''; and (B) by striking ``of any subsection other than subsection (a)(5)(A)(ii)(II)(bb) or (a)(5)(B)(ii)(II)(bb)'' and inserting ``involving damage as defined in subsection (e)(8)(A)''. I. Purpose The Leahy-Kyl-Grassley amendment to the National Information Infrastructure (NII) Protection Act, S. 982, would strengthen the Computer Fraud and Abuse Act, 18 U.S.C. 1030, by closing gaps in the law to protect better the confidentiality, integrity, and security of computer data and networks. II. Legislative History The Computer Fraud and Abuse Act was originally enacted in 1984 to provide a clear statement of proscribed activity concerning computers to the law enforcement community, those who own and operate computers and those tempted to commit crimes by unauthorized access to computers. Rather than having to ``boot-strap'' enforcement efforts against computer crime by relying on statutory restrictions designed for other offenses, the Computer Fraud and Abuse statute, 18 U.S.C. 1030, set forth in a single statute computer-related offenses. This first Federal computer crime statute made it a felony to access classified information in a computer without authorization and a misdemeanor to access financial records or credit histories in financial institutions or to trespass into a Government computer. In succeeding years, the statute has been significantly amended only twice, in 1986 and 1994. In its current form, this statute generally prohibits the unauthorized use of computers to obtain classified or private financial record information, to trespass in Federal Government computers, to commit frauds, or to transmit harmful computer viruses. It also prohibits fraudulent trafficking in computer access passwords. Gaps in coverage remain under this statutory scheme. Specifically, the law provides criminal penalties for persons who, without or in excess of authorization, access any computer to obtain classified information or financial record information from a financial institution or consumer reporting agency, or who access a ``Federal interest computer'' to further an intended fraud. A ``Federal interest computer'' is defined to include Federal Government and financial institution computers and computers located in different States that are ``used in committing the offense.'' The privacy protection coverage of the statute has two significant gaps. First, omitted from the statute's coverage is information on any civilian or State and local government computers, since the prohibition on unauthorized computer access to obtain nonclassified information extends only to computers used by financial institutions or by the Federal Government when the perpetrator is an outsider. The second gap is the significant limitation on the privacy protection given to information held on Federal Government computers. Specifically, the prohibition only applies to outsiders who gain unauthorized access to Federal Government computers, and not to Government employees who abuse their computer access privileges to obtain Government information that may be sensitive and confidential. Likewise, omitted from the fraud protection coverage of the statute is protection for the loss of computer time resulting from computer trespasses. The 1986 amendments to the statute created the ``computer use'' exception to section 1030(a)(4), even though this Committee ``agree[d] that lost computer time resulting form repeated or sustained trespasses can reach a level of seriousness sufficient to warrant Federal prosecution.'' Senate Judiciary Committee report No. 99-432, 99th Cong., 2d sess., at p. 10 (1986). At the time of the 1986 amendments, such fraudulent computer usage was considered prosecutable under another section 1030(a)(5), when the lost computer time resulted from intentional damage to the computer. The current statute also penalizes any person who uses a computer in interstate commerce or communications to cause the transmission of a computer virus or other harmful computer program. Omitted from the coverage of this ``computer damage'' provision are Government and financial institution computers not used in interstate communications, such as intrastate local area networks used by Government agencies that contain sensitive and confidential information. Also omitted are computers used in foreign communications or commerce, despite the fact that hackers are often foreign-based. For example, the 1994 intrusion into the Rome Laboratory at Grifess Air Force Base in New York, was perpetrated by a 16-year-old hacker in the United Kingdom. More recently, in March 1996, the Justice Department tracked down a young Argentinean man who had broken into Harvard University's computers from Buenos Aires and used those computers as a staging ground to hack into many other computer sites, including the Defense Department and NASA. On June 29, 1995, Senators Kyl, Leahy, and Grassley introduced the NII Protection Act, S. 982. At hearings in both the House of Representatives and the Senate, representatives from Federal law enforcement agencies expressed the need for, and their support of, this bill. Specifically, Attorney General Janet Reno discussed the provisions of S. 982 in her October 30, 1995, responses to written questions in connection with the June 27, 1995, Judiciary Committee oversight hearing of the Department of Justice; Federal Bureau of Investigation Director Louis Freeh testified about S. 982 during the February 28, 1996, joint hearing with the Select Committee on Intelligence and the Judiciary Committee on economic espionage; and U.S. Secret Service Deputy Assistant Director of Investigations Robert Rasor testified about S. 982 during the October 11, 1995, hearing of the House Committee on Banking and Financial Services Subcommittee on Domestic and International Monetary Policy. As intended when the law was originally enacted, the Computer Fraud and Abuse statute facilitates addressing in a single statute the problem of computer crime, rather than identifying and amending every potentially applicable statute affected by advances in computer technology. As computers continue to proliferate in businesses and homes, and new forms of computer crimes emerge, Congress must remain vigilant to ensure that the Computer Fraud and Abuse statute is up-to-date and provides law enforcement with the necessary legal framework to fight computer crime. The NII Protection Act will likely not represent the last amendment to this statute, but is necessary and constructive legislation to deal with the current increase in computer crime. III. Committee Action On June 13, 1996, the Committee on the Judiciary first considered the NII Protection Act, S. 982, as an amendment made by Senators Leahy, Kyl, and Grassley to H.R. 1533, a bill to amend title 18, United States Code, to increase the penalty for escaping from a Federal prison. At that time, with a quorum present, by voice vote, the Committee unanimously accepted the Leahy-Kyl-Grassley amendment to H.R. 1533, and unanimously ordered H.R. 1533, so amended, favorably reported. On August 1, 1996, the Committee on the Judiciary, with a quorum present, again accepted an amendment in the nature of a substitute to S. 982 offered by Senator Leahy, on behalf of himself and Senators Kyl and Grassley. The amendment included the provisions in the S. 982, as introduced, with one modification. As discussed in more detail below, the amendment inserted the word ``nonpublic'' before ``computer of a department or agency'' in section 2(1)(C)(I) of the bill. The Leahy-Kyl-Grassley amendment was accepted by voice vote, and the Committee, also by voice vote, then unanimously ordered S. 982, as amended, favorably reported. IV. Section-by-Section Analysis detailed discussion of the nii protection act The bill amends five of the prohibited acts in, and adds a new prohibited act to, 18 U.S.C. 1030(a). Each of the amended provisions is discussed below. (1) Amendments and addition to prohibited acts (A) Subsection 1030(a)(1)--Protection of classified government information The bill would bring the protection for classified national defense or foreign relations information maintained on computers in line with our other espionage laws. Section 1030(a)(1) currently provides that anyone who knowingly accesses a computer without authorization or exceeds authorized access and obtains classified information ``with the intent or reason to believe that such information so obtained is to be used to the injury of the United States, or to the advantage of any foreign nation'' is subject to a fine or imprisonment for not more than 10 years for a first offense. This scienter element apparently was originally included because it is contained in 18 U.S.C. 794(a). Section 794(a), however, provides for life imprisonment, whereas section 1030(a)(1) provides for only a 10-year term of imprisonment. Therefore, the NII Protection Act would amend section 1030(a)(1) to track the scienter requirement of 18 U.S.C. 793(e), which also provides a maximum penalty of 10 years imprisonment for obtaining from any source certain items relating to the national defense. As amended, section 1030(a)(1) prohibits anyone from knowingly accessing a computer, without, or in excess of, authorization, and obtaining classified national defense, foreign relations information, or restricted data under the Atomic Energy Act, with reason to believe the information could be used to the injury of the United States or the advantage of a foreign country, and willfully communicating, delivering or transmitting, or causing the same, or willfully retaining the information and failing to deliver it to the appropriate Government agent. The amendment specifically covers the conduct of a person who deliberately breaks into a computer without authority, or an insider who exceeds authorized access, and thereby obtains classified information and then communicates the information to another person, or retains it without delivering it to the proper authorities. Although there is considerable overlap between 18 U.S.C. 793(e) and section 1030(a)(1), as amended by the NII Protection Act, the two statutes would not reach exactly the same conduct. Section 1030(a)(1) would target those persons who deliberately break into a computer to obtain properly classified Government secrets then try to peddle those secrets to others, including foreign governments. In other words, unlike existing espionage laws prohibiting the theft and peddling of Government secrets to foreign agents, section 1030(a)(1) would require proof that the individual knowingly used a computer without authority, or in excess of authority, for the purpose of obtaining classified information. In this sense then, it is the use of the computer which is being proscribed, not the unauthorized possession of, access to, or control over the classified information itself. (B) Subsection 1030(a)(2)--Protection of financial, Government and other computer information The bill would amend section 1030(a)(2) to increase protection for the privacy and confidentiality of computer information. Section 1030(a)(2) currently gives special protection only to information on the computer systems of financial institutions and consumer reporting agencies, because of their significance to our country's economy and the privacy of our citizens. Yet, increasingly computer systems provide the vital backbone to many other industries, such as transportation, power supply systems, and telecommunications. The bill would amend section 1030(a)(2) and extend its coverage to information held on (1) Federal Government computers and (2) computers used in interstate or foreign commerce on communications, if the conduct involved an interstate or foreign communication. As amended, section 1030(a)(2) would penalize those who intentionally access computers without, or in excess of, authorization to obtain government information and, where appropriate, information held on private computers. ``Information'' as used in this subsection includes information stored in intangible form. Moreover, the term ``obtaining information'' includes merely reading it. There is no requirement that the information be copied or transported. This is critically important because, in an electronic environment, information can be ``stolen'' without asportation, and the original usually remains intact. This interpretation of ``obtaining information'' is consistent with congressional intent expressed as follows in connection with 1986 amendments to the Computer Fraud and Abuse statute: Because the premise of this subsection is privacy protection, the Committee wishes to make clear that `obtaining information' in this context includes mere observation of the data. Actual asportation, in the sense of physically removing the date from its original location or transcribing the data, need not be proved in order to establish a violation of this subsection. Senate Judiciary Committee report No. 99-432, 99th Cong., 2d sess., at pp. 6-7 (1986). The proposed subsection 1030(a)(2)(C) is intended to protect against the interstate or foreign theft of information by computer. This information, stored electronically, is intangible, and it has been held that the theft of such information cannot be charged under more traditional criminal statutes such as Interstate Transportation of Stolen Property, 18 U.S.C. 2314. See United States v. Brown, 925 F.2d 1301, 1308 (10th Cir. 1991). This subsection would ensure that the theft of intangible information by the unauthorized use of a computer is prohibited in the same way theft of physical items are protected. In instances where the information stolen is also copyrighted, the theft may implicate certain rights under the copyright laws. The crux of the offense under subsection 1030(a)(2)(C), however, is the abuse of a computer to obtain the information. The seriousness of a breach in confidentiality depends, in considerable part, on the value of the information taken, or on what is planned for the information after it is obtained. Thus, the statutory penalties are structured to provide that obtaining information of minimal value is only a misdemeanor, but obtaining valuable information, or misusing information in other more serious ways, is a felony. The sentencing scheme for section 1030(a)(2) is part of a broader effort to ensure that sentences for section 1030 violations adequately reflect the nature of the offense. Thus, under the bill, the harshest penalties are reserved for those who obtain classified information that could be used to injure the United States or assist a foreign state. Those who improperly use computers to obtain other types of information-- such as financial records, nonclassified Government information, and information of nominal value from private individuals or companies--face only misdemeanor penalties, unless the information is used for commercial advantage, private financial gain or to commit any criminal or tortious act. For example, individuals who intentionally break into, or abuse their authority to use, a computer and thereby obtain information of minimal value of $5,000 or less, would be subject to a misdemeanor penalty. The crime becomes a felony if the offense was committed for purposes of commercial advantage or private financial gain, for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State, or if the value of the information obtained exceeds $5,000. The terms ``for purposes of commercial advantage or private financial gain'' and ``for the purpose of committing any criminal or tortious act'' are taken from the copyright statute (17 U.S.C. 506(a)) and the wiretap statute (18 U.S.C. 2511(1)(d)), respectively, and are intended to have the same meaning as in those statutes. Some conduct may violate more than one subsection of section 1030(a)(2). For example, a particular Government computer might be covered by both sections 1030(a)(2)(B) and (a)(2)(C). This overlap serves to eliminate legal issues that may arise if the provisions were mutually exclusive. Conceivably, in a given case, it may not be clear whether information taken from a Government contractor's computer constitutes ``information from any department or agency of the United States'' under section 1030(a)(2)(B), but the offense might still be chargeable under section 1030(a)(2)(C) if the elements of that subsection are satisfied. Similarly, there may be some overlap between section 1030(a)(2) and 18 U.S.C. 641 (relating to the theft and conversion of public money, records or property), but the former does not preempt the latter. (C) Subsection 1030(a)(3)--Protection for Government computer systems The NII Protection Act would make three modifications to subsection 1030(a)(3), which is focused on providing protection to Federal Government computers from outside hackers. This provision currently prohibits a person from intentionally accessing, without authorization, a Federal Government computer and, if the computer is not exclusively used by the Government, then the conduct must ``adversely affect[] the use of the Government's operation of such computer.'' First, the bill would delete the word ``adversely'' because this term suggests, inappropriately, that trespassing in a computer used by the Federal Government, even if not exclusively, may be benign. Second, the bill would modify ``computer of a department or agency of the United States'' with the term ``non-public.'' This would make clear that unauthorized access is barred to any ``non-public'' Federal Government computer and that a person who is permitted to access publicly available Government computers, for example, via an agency's World Wide Web site, may still be convicted under (a)(3) for accessing without authority any nonpublic Federal Government computer. Finally, the phrase ``the use of the Government's operation of such computer'' would be clarified with the term ``that use.'' When a computer is used for the Government, the Government is not necessarily the operator, and the old phrase may lead to confusion. Consistent with this change, a similar change is made by the NII Protection Act in the reference to government and financial institution computers in the new definition of ``protected computer'' in section 1030(e)(2)(A). (D) Subsection 1030(a)(4)--Increased penalties for significant unauthorized use of computers The bill amends 18 U.S.C. 1030(a)(4) to ensure that sanctions apply when the fraudulent use of a computer without, or in excess of, authority is significant. The current statute penalizes, with fines and up to 5 years' imprisonment, knowingly accessing a computer with the intent to defraud and by means of such conduct furthering the fraud and obtaining anything of value. This provision contains a ``computer use'' exception that exempts fraudulent conduct to obtain only the use of the computer. While every trespass in a computer should not be converted into a felony scheme to defraud, a blanket exception for ``computer use'' is too broad. Hackers, for example, have broken into Cray supercomputers for the purpose of running password cracking programs, sometimes amassing computer time worth far more than $5,000. In light of the large expense to the victim caused by some of these trespassing incidents, the amendment would limit the ``computer use'' exception to cases where the stolen computer use involved less than $5,000 during any one-year period. (E) Subsection 1030(a)(5)--Protection from damage to computers The bill amends subsection 1030 (a)(5) to further protect computers and computer systems covered by the statute from damage both by outsiders, who gain access to a computer without authorization, and by insiders, who intentionally damage a computer. The law currently protects computers or computer systems from damage caused by either outside hackers or malicious insiders ``through means of a computer used in interstate commerce or communications.'' Senator Leahy was the principal sponsor of the 1994 amendment to subsection 1030(a)(5), which was intended to broaden the reach of the provision by replacing the term ``federal interest computer'' with the term ``computer used in interstate commerce or communication.'' The latter term is broader because the definition of ``federal interest computer'' in section 1030(e)(2)(B) covers a computer ``which is one of two or more computers used in committing the offense, not all of which are located in the same State.'' This meant that hackers who attacked other computers in their own State were not subject to Federal jurisdiction, notwithstanding the fact that their actions may have severely affected interstate or foreign commerce. For example, individuals who attack telephone switches may disrupt interstate and foreign calls. The 1994 change remedied that defect. The definition of Federal interest computer, however, actually covered more than simply interstate activity. More specifically, section 1030(e)(2)(A) covered, generically, computers belonging to the U.S. Government or financial institutions, or those used by such entities on a nonexclusive basis if the conduct constituting the offense affected the Government's operation or the financial institution's operation of such computer. By changing section 1030(a)(5) from ``federal interest computer'' to ``computer used in interstate commerce or communication'' in the 1994 amendment, Congress inadvertently eliminated Federal protection for those Government and financial institution computers not used in interstate communications. For example, the integrity and availability of classified information contained in an intrastate local area network may not have been protected under the 1994 version of section 1030(a)(5), although its confidentiality continued to be protected under section 1030(a)(1). Thus, the current provision falls short of protecting government and financial institution computers from intrusive codes, such as computer ``viruses'' or ``worms.'' Generally, hacker intrusions that inject ``worms'' or ``viruses'' into a government or financial institution computer system which is not used in interstate communications is not a Federal offense. The NII Protection Act would change that limitation and extend Federal protection from intentionally damaging viruses to government and financial institution computers, even if they are not used in interstate communications. Specifically, as amended, subsection 1030(a)(5)(A) would penalize, with a fine and up to 5 years' imprisonment, anyone who knowingly causes the transmission of a program, information, code or command and intentionally causes damage to a protected computer. This would cover anyone who intentionally damages a computer, regardless of whether they were an outsider or an insider otherwise authorized to access the computer. Subsection 1030(a)(5)(B) would penalize, with a fine and up to 5 years' imprisonment, anyone who intentionally accesses a protected computer without authorization and, as a result of that trespass, recklessly causes damage. This would cover outsiders hackers into a computer who recklessly cause damage. Finally, subsection 1030(a)(5)(C) would impose a misdemeanor penalty, of a fine and up to 1 year imprisonment, for intentionally accessing a protected computer without authorization and, as a result of that trespass, causing damage. This would cover outside hackers into a computer who negligently or accidentally cause damage. In sum, under the bill, insiders, who are authorized to access a computer, face criminal liability only if they intend to cause damage to the computer, not for recklessly or negligently causing damage. By contrast, outside hackers who break into a computer could be punished for any intentional, reckless, or other damage they cause by their trespass. The rationale for this difference in treatment deserves explanation. Although those who intentionally damage a system, without authority, should be punished regardless of whether they are authorized users, it is equally clear that anyone who knowingly invades a system without authority and causes significant loss to the victim should be punished as well, even when the damage caused is not intentional. In such cases, it is the intentional act of trespass that makes the conduct criminal. To provide otherwise is to openly invite hackers to break into computer systems, safe in the knowledge that no matter how much damage they cause, it is no crime unless that damage was either intentional or reckless. Rather than send such a dangerous message (and deny victims any relief), it is better to ensure that section 1030(a)(5) criminalizes all computer trespass, as well as intentional damage by insiders, albeit at different levels of severity. The 1994 amendment required both ``damage'' and ``loss,'' but it is not always clear what constitutes ``damage.'' For example, intruders often alter existing log-on programs so that user passwords are copied to a file which the hackers can retrieve later. After retrieving the newly created password file, the intruder restores the altered log-on file to its original condition. Arguably, in such a situation, neither the computer nor its information is damaged. Nonetheless, this conduct allows the intruder to accumulate valid user passwords to the system, requires all system users to change their passwords, and requires the system administrator to devote resources to resecuring the system. Thus, although there is arguably no ``damage,'' the victim does suffer ``loss.'' If the loss to the victim meets the required monetary threshold, the conduct should be criminal, and the victim should be entitled to relief. The bill therefore defines ``damage'' in new subsection 1030(e)(8), with a focus on the harm that the law seeks to prevent. As in the past, the term ``damage'' will require either significant financial losses under section 1030(e)(8)(A), or potential impact on medical treatment under section 1030(e)(8)(B). The bill addresses two other concerns: causing physical injury to any person under new section 1030(e)(8)(C), and threatening the public health or safety under new section 1030(e)(8)(D). As the NII and other network infrastructures continue to grow, computers will increasingly be used for access to critical services such as emergency response systems and air traffic control, and will be critical to other systems which we cannot yet anticipate. Thus, the definition of ``damage'' is amended to be sufficiently broad to encompass the types of harm against which people should be protected. The bill also amends the civil penalty provision under section 1030(g) to be consistent with the amendments to section 1030(a)(5). The amendment to section 1030(g) provides that victims of computer abuse can maintain a civil action against the violator to obtain compensatory damages, injunctive relief, or other equitable relief. Damages are limited to economic damages, unless the defendant violated section 1030(a)(5)(A) or section 1030(a)(5)(B); that is, unless the actor intentionally caused damage, or recklessly caused damage while trespassing in a computer. (F) Subsection 1030(a)(7)--Protection from threats directed against computers The bill would add a new subsection (a)(7) to section 1030 to address a new and emerging problem of computer-age blackmail. This is a high-tech variation on old fashioned extortion. According to the Department of Justice, threats have been made against computer systems in several instances. One can imagine situations in which hackers penetrate a system, encrypt a database and then demand money for the decoding key. This new provision would ensure law enforcement's ability to prosecute modern-day blackmailers, who threaten to harm or shut down computer networks unless their extortion demands are met. The Attorney General explained in written responses to questions of Senator Leahy on October 30, 1995: These cases, although similar in some ways to other cases involving extortionate threats directed against persons or property, can be different from traditional extortion cases in certain respects. It is not entirely clear that existing extortion statutes, which protect against physical injury to person or property, will cover intangible computerized information. For example, the ``property'' protected under existing laws, such as the Hobbs Act, 18 U.S.C. 1951 (interference with commerce by extortion), or 18 U.S.C. 875(d) (interstate communication of threat to injure the property of another), does not clearly include the operation of a computer, the data or programs stored in a computer or its peripheral equipment, or the decoding keys to encrypted data. New section 1030(a)(7) would close this gap in the law and provide penalties for the interstate or international transmission of threats directed against computers and computer systems. This covers any interstate or international transmission of threats against computers, computer networks, and their data and programs whether the threat is received by mail, a telephone call, electronic mail, or through a computerized messaging service. Unlawful threats could include interference in any way with the normal operation of the computer or system in question, such as denying access to authorized users, erasing or corrupting data or programs, slowing down the operation of the computer or system, or encrypting data and then demanding money for the key. (2) Subsection 1030(c)--Increased penalties for recidivists and other sentencing changes The bill amends 18 U.S.C. 1030(c) to increase penalties for those who have previously violated any subsection of section 1030(a). The current statute subjects recidivists to enhanced penalties only if they violated the same subsection twice. For example, a person who violates the current statute by committing fraud by computer under subsection 1030(a)(4) and later commits another computer crime offense by intentionally destroying medical records under subsection 1030(a)(5), is not treated as a recidivist because his conduct violated two separate subsections of section 1030. The amendment provides that anyone who is convicted twice of committing a computer offense under subsection 1030(a) would be subjected to enhanced penalties. The penalty provisions in section 1030(c) are also changed to reflect modifications to the prohibited acts, as discussed above. (3) Subsection 1030(d)--Jurisdiction of Secret Service The bill amends subsection 1030(d) to grant the U.S. Secret Service authority to investigate offenses only under subsections (a)(2) (A) and (B), (a)(3), (a)(4), (a)(5) and (a)(6). The current statute grants the Secret Service authority to investigate any offense under section 1030, subject to agreement between the Attorney General and the Secretary of the Treasury. The new crimes proposed in the bill, however, do not fall under the Secret Service's traditional jurisdiction. Specifically, proposed subsection 1030(a)(2)(C) addresses gaps in 18 U.S.C. 2314 (interstate transportation of stolen property), and proposed section 1030(a)(7) addresses gaps in 18 U.S.C. 1951 (the Hobbs Act) and 875 (interstate threats). These statutes are within the jurisdiction of the Federal Bureau of Investigation, which should retain exclusive jurisdiction over these types of offenses, even when they are committed by computer. (4) Subsection 1030(e)--New definitions The NII Protection Act strikes the current definition of ``Federal interest computer'' and adds new definitions for ``protected computer,'' ``damage,'' and ``government entity.'' The bill would amend subsection 1030(e)(2) by replacing the term ``Federal interest computer'' with the new term ``protected computer'' and a new definition. The new definition of ``protected computer'' would modify the current description in subsection 1030(e)(2)(A) of computers used by financial institutions or the U.S. Government, to make clear that if the computers are not exclusively used by those entities, the computers are protected if the offending conduct affects the use by or for a financial institution or the Government. The new definition also replaces the current limitation in subsection 1030(e)(2)(B) of ``Federal interest computer'' being ``one of two or more computers used in committing the offense, not all of which are located in the same State.'' Instead, ``protected computer'' would include computers ``used in interstate or foreign commerce or communications.'' Thus, hackers who steal information or computer usage from computers in their own State would be subject to this law, under amended section 1030(a)(4), if the requisite damage threshold is met and the computer is used in interstate commerce or foreign commerce or communications. The term ``damage'' in new subsection 1030(e)(8), as used in the proposed amendment of subsection 1030(a)(5), would mean any impairment to the integrity or availability of data, information, program or system which (A) causes loss of more than $5,000 during any 1-year period; (B) modifies or impairs the medical examination, diagnosis or treatment of a person; (C) causes physical injury to any person; or (D) threatens the public health or safety. The term ``government entity'' in new subsection 1030(e)(9), as used in the new proposed subsection 1030(a)(7), would be defined to include the U.S. Government, any State or political subdivision thereof, any foreign country, and any state, provincial, municipal, or other political subdivision of a foreign country. (5) Subsection 1030(g)--Civil actions The bill amends the civil penalty provision in subsection 1030(g) to reflect the proposed changes in subsection 1030(a)(5). The 1994 amendments to the act authorized certain victims of computer abuse to maintain civil actions against violators to obtain compensatory damages, injunctive relief, or other equitable relief, with damages limited to economic damages, unless the violator modified or impaired the medical examination, diagnosis or treatment of a person. Under the bill, damages recoverable in civil actions by victims of computer abuse would be limited to economic losses for violations causing losses of $5,000 or more during any 1- year period. No limit on damages would be imposed for violations that modified or impaired the medical examination, diagnosis or treatment of a person; caused physical injury to any person; or threatened the public health or safety. V. Regulatory Impact Statement Pursuant to paragraph 11(b), rule XXVI of the Standing Rules of the Senate, the Committee, after due consideration, concludes that Senate bill 982 will not have direct regulatory impact. VI. Cost Estimate U.S. Congress, Congressional Budget Office, Washington, DC, August 6, 1996. Hon. Orin G. Hatch, Chairman, Committee on the Judiciary, U.S. Senate, Washington, DC. Dear Mr. Chairman: The Congressional Budget Office has prepared the enclosed cost estimate for S. 982, the National Information Infrastructure Protection Act of 1996, as reported by the Senate Committee on the Judiciary on August 2, 1996. Enacting S. 982 could affect direct spending and receipts. Therefore, pay-as-you-go procedures would apply to this bill. If you wish further details on this estimate, we will be pleased to provide them. Sincerely, James L. Blum (For June E. O'Neill). congressional budget office cost estimate 1. Bill number: S. 982. 2. Bill title: National Information Infrastructure Protection Act of 1996. 3. Bill status: As reported by the Senate Committee on the Judiciary on August 2, 1996. 4. Bill purpose: S. 982 would make various amendments to the laws that protect the confidentiality, integrity, and security of computer systems and the information maintained on such systems. In particular, the bill would amend existing statutes relating to five computer-related crimes and would add a new statute making the interstate transmission of threats directed against computers or computer systems a federal crime. 5. Estimated cost to the Federal Government: CBO estimates that enacting S. 982 would not have any significant budgetary impact. Although the legislation could affect direct spending and receipts, we estimate that any such changes would be negligible. 6. Basis of estimate: Based on information from the U.S. Sentencing Commission, CBO expects that enacting S. 982 could increase the number of prosecutions brought by the federal government and could increase governmental receipts from penalties for committing computer-related crimes. Fewer than 50 persons are convicted of existing computer-related crimes each year and CBO does not expect that the caseload under S. 982 would increase significantly. Thus, CBO estimates that the Justice Department would not need significant additional resources to enforce the provisions of the bill. Furthermore, CBO estimates that any increase in prison time served by people prosecuted under the statutes affected by S. 982 would be negligible and that the government would collect less than $500,000 a year in additional fines. Such fines are recorded in the budget as governmental receipts, deposited in the Crime Victims Fund, and spent in the following year. Because the increase in direct spending would be the same as the amount of fines collected with a one-year lag, the additional direct spending also would be less than $500,000 a year. 7. Pay-as-you-go considerations: Section 252 of the Balanced Budget and Emergency Deficit Control Act of 1985 sets up pay-as-you-go procedures for legislation affecting direct spending or receipts through 1998. S. 982 would establish new fines and increase some existing ones. CBO expects that any additional receipts would be negligible and thus the pay-as- you-go impact of this bill, as shown in the following table, also would be negligible. [By fiscal year, in millions of dollars] ------------------------------------------------------------------------ 1996 1997 1998 ------------------------------------------------------------------------ Change in outlays............................ 0 0 0 Change in receipts........................... 0 0 0 ------------------------------------------------------------------------ 8. Estimated impact on State, local, and tribal governments: S. 982 contains no intergovernmental mandates as defined in the Unfunded Mandates Reform Act of 1995 (Public Law 104-4) and would not impose costs on State, local, or tribal governments. 9. Estimated impact on the private sector: This bill would impose no new private-sector mandates as defined in Public Law 104-4. 10. Previous CBO estimate: On July 25, 1996, CBO transmitted a cost estimate for H.R. 1533, the Sexual Offender Tracking and Identification Act of 1996, as reported by the Senate Committee on the Judiciary on June 13, 1996. Section 13 of H.R. 1533 is identical to S. 982. The other provisions of H.R. 1533, as approved by the Senate Committee on the Judiciary, were not included in S. 982. 11. Estimate prepared by: Federal cost estimate: Susanne S. Mehlman and Stephanie Weiner. Impact on State, local, and tribal governments: Leo Lex. Impact on the private sector: Matthew Eyles. 12. Estimate approved by: Robert A. Sunshine (for Paul N. Van de Water, Assistant Director for Budget Analysis). VII. Changes in Existing Law In compliance with paragraph 12 of rule XXVI of the Standing Rules of the Senate, the changes in existing law made by the bill, as reported by the committee, are shown as follows (existing law proposed to be omitted is enclosed in bold brackets, new matter is printed in italic, and existing law with no changes is printed in roman): UNITED STATES CODE * * * * * * * TITLE 18--CRIMES AND CRIMINAL PROCEDURE * * * * * * * CHAPTER 47--FRAUD AND FALSE STATEMENTS * * * * * * * Sec. 1030. Fraud and related activity in connection with computers (a) Whoever-- (1) [knowingly accesses] having knowingly accessed a computer without authorization or [exceeds] exceeding authorized access, and by means of such conduct [obtains information] having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y of section 11 of the Atomic Energy Act of 1954, with [the intent or] reason to believe that such information so obtained [is to be used] could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby [obtains information] obtains-- (A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); (B) information from any department or agency of the United States; or (C) information from any protected computer if the conduct involved an interstate or foreign communication; (3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct [adversely] affects [the use of the Government's operation of such computer] that use by or for the Government of the United States; (4) knowingly and with intent to defraud, accesses a [Federal interest] protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period; [(5)(A) through means of a computer used in interstate commerce or communications, knowingly causes the transmission of a program, information, code, or command to a computer or computer system if [(i) the person causing the transmission intends that such transmission will [(I) damage, or causes damage to, a computer, computer system, network, information, data, or program; or [(II) withhold or deny, or cause the withholding or denial, of the use of a computer, computer services, system or network, information, data or program; and [(ii) the transmission of the harmful component of the program, information, code, or command-- [(I) occurred without the authorization of the persons or entities who own or are responsible for the computer system receiving the program, information, code, or command; and [(II)(aa) causes loss or damage to one or more other persons of value aggregating $1,000 or more during any 1-year period; or [(bb) modifies or impairs, or potentially modifies or impairs, the medical examination, medical diagnosis, medical treatment, or medical care of one or more individuals; or [(B) through means of a computer used in interstate commerce or communication, and knowingly causes the transmission of a program, information, code, or command to a computer or computer system-- [(i) with reckless disregard of a substantial and unjustifiable risk that the transmission will-- [(I) damage, or cause damage to, a computer, computer system, network, information, data, or program; or [(II) withhold or deny or cause the withholding or denial of the use of a computer, computer services, system, network, information, data or program; and [(ii) if the transmission of the harmful component of the program, information, code, or command-- [(I) occurred without the authorization of the persons or entities who own or are responsible for the computer system receiving the program, information, code, or command; and [(II)(aa) causes loss or damage to one or more other persons of a value aggregating $1,000 or more during any 1-year period; or [(bb) modifies or impairs, or potentially modifies or impairs, the medical examination, medical diagnosis, medical treatment, or medical care of one or more individuals;] (5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; (B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or (C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage; (6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if-- (A) such trafficking affects interstate or foreign commerce; or (B) such computer is used by or for the Government of the United States; or (7) with intent to extort from any person, firm, association, educational institution, financial institution, government entity, or other legal entity, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to cause damage to a protected computer; shall be punished as provided in subsection (c) of this section. (b) Whoever attempts to commit an offense under subsection (a) of this section shall be punished as provided in subsection (c) of this section. (c) The punishment for an offense under subsection (a) or (b) of this section is-- (1)(A) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under [such subsection] this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subsection (a)(1) of this section which occurs after a conviction for another offense under [such subsection] this section, or an attempt to commit an offense punishable under this subparagraph; and (2)(A) a fine under this title or imprisonment for not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3), (a)(5)(C), or (a)(6) of this section which does not occur after a conviction for another offense under [such subsection] this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection (a)(2) if-- (i) the offense was committed for purposes of commercial advantage or private financial gain; (ii) the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or (iii) the value of the information obtained exceeds $5,000; [B] (C) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after a conviction for another offense under [such subsection] this section, or an attempt to commit an offense punishable under this subparagraph; and (3)(A) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection [(a)(4) or (a)(5)(A)] (a)(4), (a)(5)(A), (a)(5)(B), or (a)(7) of this section which does not occur after a conviction for another offense under [such subsection] this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection [(a)(4) or (a)(5)] (a)(4), (a)(5)(A), (a)(5)(B), (a)(5)(C), or (a)(7) of this section which occurs after a conviction for another offense under [such subsection] this section, or an attempt to commit an offense punishable under this subparagraph; and [(4) a fine under this title or imprisonment for not more than 1 year, or both, in the case of an offense under subsection (a)(5)(B).] (d) The United States Secret Service shall, in addition to any other agency having such authority, have the authority to investigate offenses under subsections (a)(2)(A), (a)(2)(B), (a)(3), (a)(4), (a)(5), and (a)(6) of this section. Such authority of the United States Secret Service shall be exercised in accordance with an agreement which shall be entered into by the Secretary of the Treasury and the Attorney General. (e) As used in this section-- (1) the term ``computer'' means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device; (2) the term [Federal interest] protected computer means a computer-- (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects [the use of the financial institution's operation or the Government's operation of such computer] that use by or for the financial institution or the Government; or [(B) which is one of two or more computers used in committing the offense, not all of which are located in the same State] (B) which is used in interstate or foreign commerce or communication; (3) the term ``State'' includes the District of Columbia, the Commonwealth of Puerto Rico, and any other commonwealth, possession or territory of the United States; (4) the term ``financial institution'' means-- (A) an institution, with deposits insured by the Federal Deposit Insurance Corporation; (B) the Federal Reserve or a member of the Federal Reserve including any Federal Reserve Bank; (C) a credit union with accounts insured by the National Credit Union Administration; (D) a member of the Federal home loan bank system and any home loan bank; (E) any institution of the Farm Credit System under the Farm Credit Act of 1971; (F) a broker-dealer registered with the Securities and Exchange Commission pursuant to section 15 of the Securities Exchange Act of 1934; (G) the Securities Investor Protection Corporation; (H) a branch or agency of a foreign bank (as such terms are defined in paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978); and (I) an organization operating under section 25 or section 25(a) of the Federal Reserve Act. (5) the term ``financial record'' means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution; (6) the term ``exceeds authorized access'' means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accessor is not entitled so to obtain or alter; [and] (7) the term ``department of the United States'' means the legislative or judicial branch of the Government or one of the executive departments enumerated in section 101 of title 5[.]; and (8) the term ``damage'' means any impairment to the integrity or availability of data, a program, a system, or information that-- (A) causes loss aggregating at least $5,000 in value during any 1-year period to one or more individuals; (B) modifies or impairs, or potentially modifies or impairs, the medical examination, diagnosis, treatment, or care of one or more individuals; (C) causes physical injury to any person; or (D) threatens public health or safety; and (9) the term ``government entity'' includes the Government of the United States, any State or political subdivision of the United States, any foreign country, and any state, province, municipality or other political subdivision of a foreign country. (f) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States. (g) any person who suffers damage or loss by reason of a violation of the section [,other than a violation of subsection (a)(5)(B),] may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. Damages for violations [of any subsection other than subsection (a)(5)(A)(ii)(II)(bb) or (a)(5)(B)(ii)(II)(bb)] involving damage under subsection (e)(8)(A) are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage. (h) The Attorney General and the Secretary of the Treasury shall report to the Congress annually, during the first 3 years following the date of the enactment of this subsection, concerning investigations and prosecutions under section 1030(a)(5) of title 18, United States Code.